ELEC 691X/498X Broadcast Signal Transmission Winter 2018

Size: px
Start display at page:

Download "ELEC 691X/498X Broadcast Signal Transmission Winter 2018"

Transcription

1 ELEC 691X/498X Broadcast Signal Transmission Winter 2018 Instructor: DR. Reza Soleymani, Office: EV 5.125, Telephone: ext.: Office Hours: Wednesday, Thursday, 14:00 15:00 Slide 1

2 In this lecture we cover the following topics: Error Control Coding: FEC versus ARQ. Block and Convolutional Codes. Reed Solomon RS Codes. Concatenated Coding used in DVB T. Possibly in the future lectures: Low Density Parity Check LDPC Codes in DVB S2. Raptor Codes. Slide 2

3 In previous lectures, we have learnt about data compression, i.e., how to encode the video with the least possible bit rate given a desired level of quality. We have also learnt how to packetize, i.e., organizing the bits at the output of the encoder into stream of equal length packets: Transport Stream MPEG TS. These packets are then sent over the channel to the receiver so that they can be decoded and used by the client. Alternatively, the packetized stream TS can be saved on a storage medium such as a DVD or a Blu ray disk for future viewing. Data going through any medium encounter noise and other impairments resulting in errors in the transport stream. In the analog TV or in case we could encode the video pixel by pixel, the effect of noise would be limited to one pixel. However, in the case of MPEG encoding, an error may result in destroying several macroblocks or even Group of Pictures GOP resulting in destroying considerable part of a video. Even a single erroneous bit may cause effects that may persist until the arrival of a new Intra frame I frame or even longer. If error rate increases, the picture is Slide 3

4 completely lost. While in the old analog system, the effect of noise was seen directly as snow flake like impairment in the picture and the effect of noise increased as a function of the quality of your receiver the noise power and your distance from the TV station your received power in a continuous graceful way, in the case of digital TV, you either have perfect picture or nothing. Slide 4

5 Slide 5

6 In Terrestrial TV DVB T/T2 or satellite TV DVB S/S2/S2X transport stream is transmitted directly, we only need to concern ourselves with bit errors and use error correcting codes at the physical level. However, with the increase in the number of viewers watching TV over the Internet either IP TV or OTT applications such as NetFlix, TS is more and more being transmitted over IP. That is, MPEG Transport Streams get encapsulated inside an IP stream. With the increase in the speed of the Internet whether it is the land line cable and VDSL or wireless such as LTE, real time broadcasting of video over the Internet has become feasible. Going over an IP network, an MPEG TS faces another type of data loss due to loss of the packets as a result of collision and/ buffer overflow. To overcome this type of transmission impairment, we need to use error or possibly erasure protection coding at the transport and higher layers. Slide 6

7 Real time transport protocol IP networks were not designed for real time delivery of data and can have unpredictable jitter and delay. To maintain QoS, the multimedia data that travels on the IP networks must arrive on time and in the same order it was sent. Real time Transport Protocol RTP can be used to address the time critical requirement of multimedia bit streams. RTP provides a timestamp and sequence number to IP packets containing media data. These can be used by the receiver to synchronize playback and manage buffers minimizing network jitter. Encapsulating media data into IP packets Delivering media bit streams over IP requires several layers of encapsulation. MPEG 2 transport streams, for example, consist of a series of 188 byte packets. These are grouped together and wrapped within an Slide 7

8 RTP packet. Finally, the RTP packet is encapsulated within a TCP or UDP datagram, forming an IP packet. Figure below shows an RTP packet containing several MPEG 2 transport packets within its payload, all encapsulated using UDP in an IP packet. This diagram shows seven 188 byte transport packets that constitute the RTP payload. Each encapsulation adds additional header data and adds to the total required bandwidth. Slide 8

9 If the network has sufficient QoS, it is possible to deliver media packets without the overhead of RTP. The packets are instead inserted directly into UDP packets. Next figure shows how MPEG 2 transport stream packets can be encapsulated within a UDP/IP packet. Sending MPEG 2 transport stream packets over UDP is used extensively within the private networks of cable and telephone companies to deliver MPEG 2 transport streams throughout the system. For general delivery over the unmanaged Internet without QoS guarantees, streaming protocols such as RTP may be used, but even then, packets may be lost in delivery, resulting in artifacts in the media presentation. TCP: Transmission Control Protocol. UDP: User Datagram Protocol. RTP: Real time Transport Protocol. Slide 9

10 In order to perform error detection/correction, we need to add overhead to the data to be transmitted in order to make a legitimate data stream different from a randomly corrupted stream of data. The overhead will be in the form of parities. As an example consider transmission of a number of bits. The bits in a k bit long message represent values ranging from 0 to 2 1for example if k 8, the numbers range from 0 to 255. Now if a bit is in error, we get another data stream which is in our list and we do not notice the error. Now, if we add on extra bit such that the number of 1 s in the stream is odd or even then a single error will change the parity and we will get a pattern which we know could not have been transmitted. So, we detect a single error by adding a single parity bit. We may find the location of the error as well if we add several parity bits each making the parity of a subset of the bits. Example: Consider that we have a 4 bit long message,,,,. If we add three parity bits,,, such that, Slide 10

11 Then an error in will result in parities and being violated and an error in in will result in parities and being changed and so on. This is a 7, 4 Hamming code that can correct any single error. Note that here we have increased the rate of transmission and, therefore, the required bandwidth by 7/4 in order to protect bits from being delivered erroneously. Let s now access the performance of this simple code. Assume that we had an of 10 db. That is Assume we are using QPSK modulation where If we use the above 7, 4 code, for each 4 bits we send 7 bits. So, in order to keep constant, we need to reduce the energy per each coded bit by 4/7. This means that we transmit at an of The bit error rate before error correction will be But the probability of error after decoding is the probability that we have more than one error at the output of the demodulator before the decoding. Slide 11

12 The probability of an error is then, or, where p and, therefore, Assuming that when there is an error in a 7 bit codeword on the average half the bits are in error, the bit error rate of the coded system is which is roughly the same as the un coded system. The reason for the poor performance of the code is its short length. Hamming codes may be designed of any length 2 1and information length 2 1 for any integer 2. The number of parity bits is and they can all correct one erroneous bit. We may, therefore, have Hamming codes 15, 11 or 31, 26 and so on. Slide 12

13 Now let s go back to the previous example of QPSK working at 10. But this time use a 31, 26 Hamming code. The uncoded as before. Now, however, the channel symbol energy over noise density is The bit error rate before error correction will be or, where p and, therefore, and This is more than an order of magnitude better than the uncoded case. Slide 13

14 Discussing the simple example of using Hamming code or even only a single parity bit, hopefully, has clarified for you the concept of using redundancy for the purpose of error detection and error correction. It is clear that detecting the existence of errors is both simpler in terms of decoder complexity and less costly requiring less number of parity bits and, therefore, requiring less bandwidth. Cyclic Redundancy Codes CRC are used in order to detect errors. After detecting errors, the receiver has two options: 1 to discard the erroneous data and 2 ask the transmitter to retransmit the corrupted data again. The latter is called Automatic Repeat Request ARQ. ARQ has the advantaged of being adaptive to channel condition. When the channel is good, there are not many erroneous packets and therefore, not much retransmission. So, the overhead is mostly the few parity bits used for detecting the errors. The problem with ARQ is, however, the fact that it is not suitable for delay sensitive real time traffic such as voice and real time video. This is particularly true for links with high transmission delay. Take a satellite link where the end to end delay is close to 500 milliseconds. Such delay is not tolerable in the case of voice and real time video. For real time traffic, enough redundancy is added so that the errors can be Slide 14

15 Schemes allowing enough redundancy so that the receiver can correct the erroneously received packets are called Forward Error Correction FEC schemes. Unlike ARQ where the scheme adapts itself to the channel condition, for FEC the system should be designed with an as accurate as possible assessment of the channel. If the code chosen correct less than the number of errors created by the channel, the errors remain uncorrected and even extra errors may be added. On the other hand if the code used is capable of correcting more errors than what the channel causes, the extra error correcting capability is wasted, i.e., we have wasted bandwidth without gaining anything. Block Codes and Convolutional Codes: The error correcting codes are broadly divided into two categories: block codes and convolutional codes. For a block code, blocks of information bits enter the encoder and the encoder outputs bits. In a systematic encoder, these bits include the information bits plus parity bits. A block code encoder, after encoding a block of bits starts working on the next bits and forgets all about the previous block, i.e., a block does not have any memory beyond the block on which it is working at a given time. Slide 15

16 The output of a convolutional encoder, on the other hand, does not only depend on the current input, but also on the previous inputs and/or outputs. Slide 16

17 The above figure shows simple convolutional code for two bits of memory, hence four states. The two outputs are formed by XORing the input and some of the past inputs. This is a rate ½ code. The operation of a convolutional encoder can be described by a state diagram, a tree or a trellis. Using trellis is more common. Following is trellis representation of a rate ½ encoder with memory two: Slide 17

18 The decoder of a convolutional code consists of any mechanism that can go through the trellis and finds the one path that is closest to the received sequence. The most common decoding technique is the Viterbi decoder. Viterbi decoder can either be used after demodulation,. In such a case it looks for the path that differs in least number of bits with the output of the demodulator. The number of places in which two binary sequences are different is called the Hamming distance. So, in this case, the decoder tries to find the path whose labels have the minimum Hamming distance with the demodulated sequence. This is called hard Viterbi decoding. It is also possible that the decoder finds the Euclidean distance between the output of the receiver filter and the sequence of labels of the paths and finds the path whose branch labels have the minimum Hamming distance from the received values. This is called soft decision Viterbi decoding. Soft decision decoding has usually about 3 db advantage over decision. The convolutional code used in DVB and many industrial applications is a rate ½ 64 state encoder, i.e., one with 6 memory length 6 Flip flops saving the past inputs. Slide 18

19 The encoder for this code is, One can have other rates by puncturing the output of the rate ½ encoder. For example, one can feed two bits at the input and get a total of 4 outputs 2 at each output point. Deleting one of 4 outputs one will have a rate 2/3 code 2 bits in, 3 bits out. Slide 19

20 This table shows the puncturing pattern for other rates: Slide 20

21 Following is a comparison of the performance of the convolutional code with soft and hard Viterbi decoding with the uncoded case: Slide 21

22 The memory of the convolutional codes causes the errors to occur in burst. To see this assume that a bit is decoded in error, i.e., a wrong path has been chosen on a trellis. It takes the deocdeer at least K stages to get back back to the right track where K is the constraint length of the code which is the number of memory bits plus one to count for the present bit as well as K 1 past input bits. This means that the convolutional encoding turns a memoryless AWGN channel into a burst error channel. In order to combat this Reed Solomon codes are used in a concatenation arrangement. The information is first encoded using an RS encoder called the outer code and then the output of the RS encoder is encoded using a convolutional encoder the inner code. At the receiver first the Viterbi decoder is applied to recover the input of the convolutional encoder and then the Slide 22

23 RS decoding is performed. Reed Solomon RS codes are non binary codes. For each integer one can define an RS code with 2 1 symbols, each symbol consisting of bits. of the symbols can be the information and symbols will be the parity symbols. An, RS code can correct up to errors, where represents the floor of x, i.e., the largest integer smaller than x. Example: Take 4. Then So each code word consists of 15 symbols each being 4 bits long. So each codeword will be 60 bits long. Taking, for example k 11, we will have a 15, 11 RS code that encodes 11 symbols 4x11 44 bits into 15 symbols 60 bits. It can correct up to 2 erroneous 4 bit symbols. Example: The RS code with m 8 is of particular interest as each of the symbols represent a byte. For m 8, the code length n 255. That is each codeword consists of bit symbols. Taking k 239, we will have 255, 239 code. This code encodes 239 bytes 1912 bits into 255 bytes 2040 bits by appending 16 bytes of parity. It can correct up to 8 erroneous bytes. So, it can correct any error burst of length 7x8 56 bits. Slide 23

24 As we discussed earlier MPEG TS consists of packets of length 188 bytes. If we wanted to use an RS code of length 255, we needed to add 67 bytes of parity which is too much and results in unnecessary wastage of bandwidth. In order to avoid this, we can shorten the RS code. We can append the 188 data bytes with 51 bytes of zero 408 zeros. Since the RS code is systematic, i.e., the data and parity parts are separate and distinguishable, we can omit these zeros prior to transmission in fact these zeros are just conceptual. The result will be a 204, 188 shortened RS code. Performance Evaluation of the RS Codes: We will try to find an approximate value for the probability of error using Reed Solomon codes. As it was stated above, an n, k RS code can correct up to erroneous m bit symbols. IF the number of errors is more than, then some or all of the errors remain un corrected. It is even possible that the decoder add extra errors by trying to correct symbols that are not in error. We take the worst case and assume that if there are errors, the decoder not only does not correct any of the errors, but also add errors. So, the probability of error given that we there are errors is. The probability that a received codeword Slide 24

25 has errors is 1 where is the probability that a symbol is in error. Let the probability of encoded bits before decoding be. Then, 1 1 The bit error rate is determined based on the modulation scheme used for example, for QPSK it is given by, 2 2 There are sequence with errors among the possible n symbol sequences where,!.!! So, the symbol error rate will, approximately, be: 1 Slide 25

26 Assuming that when a symbol error occurs, on the average, half the bits are in error, we get, DVB Example: In DVB standard a 204, 188 RS code is used, so, t 8. That is, the decoder can recover all the 204 byte long TS packet that have less than 9 erroneous bytes. So, Assume that we are using BPSK modulation at 8. The un coded BER is,, Now let s see that RS code can do for us. The BER of the coded stream after the demodulator and before decoding is, Slide 26

27 The symbol error rate before decoding is So, Since the terms are decreasing rapidly, we can use the first term as a lower bound on the probability of error. If you calculate the term for 10 you see that it is about 0.05 of the term for 9. So, Slide 27

CSEP 561 Error detection & correction. David Wetherall

CSEP 561 Error detection & correction. David Wetherall CSEP 561 Error detection & correction David Wetherall djw@cs.washington.edu Codes for Error Detection/Correction ti ti Error detection and correction How do we detect and correct messages that are garbled

More information

Link Layer: Error detection and correction

Link Layer: Error detection and correction Link Layer: Error detection and correction Topic Some bits will be received in error due to noise. What can we do? Detect errors with codes Correct errors with codes Retransmit lost frames Later Reliability

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS

FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS FORWARD ERROR CORRECTION CODING TECHNIQUES FOR RELIABLE COMMUNICATION SYSTEMS Jyoti Sharma Department of ECE Sri Sai College of Engg. & Technology, Badhani, Punjab, India Priya Department of ECE Sri Sai

More information

Video Streaming Over Multi-hop Wireless Networks

Video Streaming Over Multi-hop Wireless Networks Video Streaming Over Multi-hop Wireless Networks Hao Wang Dept. of Computer Information System, Cameron University hwang@cameron.edu Andras Farago, Subbarayan Venkatesan Dept. of Computer Science, The

More information

4 rd class Department of Network College of IT- University of Babylon

4 rd class Department of Network College of IT- University of Babylon 1. INTRODUCTION We can divide audio and video services into three broad categories: streaming stored audio/video, streaming live audio/video, and interactive audio/video. Streaming means a user can listen

More information

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl

Ad hoc and Sensor Networks Chapter 6: Link layer protocols. Holger Karl Ad hoc and Sensor Networks Chapter 6: Link layer protocols Holger Karl Goals of this chapter Link layer tasks in general Framing group bit sequence into packets/frames Important: format, size Error control

More information

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen

Networked Systems and Services, Fall 2018 Chapter 2. Jussi Kangasharju Markku Kojo Lea Kutvonen Networked Systems and Services, Fall 2018 Chapter 2 Jussi Kangasharju Markku Kojo Lea Kutvonen Outline Physical layer reliability Low level reliability Parities and checksums Cyclic Redundancy Check (CRC)

More information

4. Error correction and link control. Contents

4. Error correction and link control. Contents //2 4. Error correction and link control Contents a. Types of errors b. Error detection and correction c. Flow control d. Error control //2 a. Types of errors Data can be corrupted during transmission.

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by:

T325 Summary T305 T325 B BLOCK 4 T325. Session 3. Dr. Saatchi, Seyed Mohsen. Prepared by: T305 T325 B BLOCK 4 T325 Summary Prepared by: Session 3 [Type Dr. Saatchi, your address] Seyed Mohsen [Type your phone number] [Type your e-mail address] Dr. Saatchi, Seyed Mohsen T325 Error Control Coding

More information

Packet-Level Forward Error Correction in Video Transmission

Packet-Level Forward Error Correction in Video Transmission Packet-Level Forward Error Correction in Video Transmission Matteo Mazzotti, Enrico Paolini, Marco Chiani, Davide Dardari, and Andrea Giorgetti University of Bologna Wireless Communications Laboratory

More information

Forward Error Correction Using Reed-Solomon Codes

Forward Error Correction Using Reed-Solomon Codes Exercise 5 Forward Error Correction Using Reed-Solomon Codes EXERCISE OBJECTIVE When you have completed this exercise, you will be familiar with the concept of forward error correction (FEC). You will

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

COMPUTER NETWORKS UNIT-3

COMPUTER NETWORKS UNIT-3 COMPUTER NETWORKS UNIT-3 Syllabus: The Data Link Layer - Data Link Layer Design Issues, Services Provided to the Network Layer Framing Error Control Flow Control, Error Detection and Correction Error-Correcting

More information

CSE 123: Computer Networks

CSE 123: Computer Networks Student Name: PID: UCSD email: CSE 123: Computer Networks Homework 1 Solution (Due 10/12 in class) Total Points: 30 Instructions: Turn in a physical copy at the beginning of the class on 10/10. Problems:

More information

Link Layer. (continued)

Link Layer. (continued) Link Layer (continued) Where we are in the Course Moving on up to the Link Layer! Application Transport Network Link Physical CSE 461 University of Washington 2 Topics 1. Framing Delimiting start/end of

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 & February

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

Chapter 3. The Data Link Layer

Chapter 3. The Data Link Layer Chapter 3 The Data Link Layer 1 Data Link Layer Algorithms for achieving reliable, efficient communication between two adjacent machines. Adjacent means two machines are physically connected by a communication

More information

CSCI-1680 Link Layer I Rodrigo Fonseca

CSCI-1680 Link Layer I Rodrigo Fonseca CSCI-1680 Link Layer I Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Last time Physical layer: encoding, modulation Today Link layer framing Getting frames

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer

Pending Issues. Opera,ng Systems and Networks. Network Lecture 3: Link Layer (1) Where we are in the Course. Scope of the Link Layer Opera,ng Systems and Networks Network Lecture 3: Link Layer (1) Adrian Perrig Network Security Group ETH Zürich Pending Issues Earlier pos,ng of lecture slides Answering student ques,ons Project 1 is out

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAGE COMPRESSION STANDARDS Lesson 19 JPEG-2000 Error Resiliency Instructional Objectives At the end of this lesson, the students should be able to: 1. Name two different types of lossy

More information

Networking Applications

Networking Applications Networking Dr. Ayman A. Abdel-Hamid College of Computing and Information Technology Arab Academy for Science & Technology and Maritime Transport Multimedia Multimedia 1 Outline Audio and Video Services

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

EE 387 course information

EE 387 course information EE 387 course information EE 387, Notes 1, Handout #2 Instructor: John Gill, Packard 266 Textbook: Algebraic Codes for Data Transmission by Richard Blahut Weekly homework, including occasional programming

More information

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science

Advanced Computer Networks. Rab Nawaz Jadoon DCS. Assistant Professor COMSATS University, Lahore Pakistan. Department of Computer Science Advanced Computer Networks Department of Computer Science DCS COMSATS Institute of Information Technology Rab Nawaz Jadoon Assistant Professor COMSATS University, Lahore Pakistan Advanced Computer Networks

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission

Lecture 4: CRC & Reliable Transmission. Lecture 4 Overview. Checksum review. CRC toward a better EDC. Reliable Transmission 1 Lecture 4: CRC & Reliable Transmission CSE 123: Computer Networks Chris Kanich Quiz 1: Tuesday July 5th Lecture 4: CRC & Reliable Transmission Lecture 4 Overview CRC toward a better EDC Reliable Transmission

More information

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction

Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track. RTP Payload Format for Generic Forward Error Correction Network Working Group A. Li, Ed. Request for Comments: 5109 December 2007 Obsoletes: 2733, 3009 Category: Standards Track RTP Payload Format for Generic Forward Error Correction Status of This Memo This

More information

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control

Wireless Sensornetworks Concepts, Protocols and Applications. Chapter 5b. Link Layer Control Wireless Sensornetworks Concepts, Protocols and Applications 5b Link Layer Control 1 Goals of this cha Understand the issues involved in turning the radio communication between two neighboring nodes into

More information

Inst: Chris Davison

Inst: Chris Davison ICS 153 Introduction to Computer Networks Inst: Chris Davison cbdaviso@uci.edu ICS 153 Data Link Layer Contents Simplex and Duplex Communication Frame Creation Flow Control Error Control Performance of

More information

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks?

COMPUTER NETWORKS UNIT I. 1. What are the three criteria necessary for an effective and efficient networks? Question Bank COMPUTER NETWORKS Short answer type questions. UNIT I 1. What are the three criteria necessary for an effective and efficient networks? The most important criteria are performance, reliability

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

The Data Link Layer Chapter 3

The Data Link Layer Chapter 3 The Data Link Layer Chapter 3 Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols Revised: August 2011 The Data

More information

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture)

Lecture 7: Sliding Windows. CSE 123: Computer Networks Geoff Voelker (guest lecture) Lecture 7: Sliding Windows CSE 123: Computer Networks Geoff Voelker (guest lecture) Please turn in HW #1 Thank you From last class: Sequence Numbers Sender Receiver Sender Receiver Timeout Timeout Timeout

More information

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Lecture 6 Datalink Framing, Switching. From Signals to Packets Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to

More information

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16>

IEEE Broadband Wireless Access Working Group <http://ieee802.org/16> Project Title Date Submitted IEEE 802.6 Broadband Wireless Access Working Group FEC Performance of Concatenated Reed-Solomon and Convolutional Coding with Interleaving 2000-06-08

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes

Fault Tolerance & Reliability CDA Chapter 2 Additional Interesting Codes Fault Tolerance & Reliability CDA 5140 Chapter 2 Additional Interesting Codes m-out-of-n codes - each binary code word has m ones in a length n non-systematic codeword - used for unidirectional errors

More information

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1,

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Nov 1, CSMC 417 Computer Networks Prof. Ashok K Agrawala 2018 Ashok Agrawala 1 Message, Segment, Packet, and Frame host host HTTP HTTP message HTTP TCP TCP segment TCP router router IP IP packet IP IP packet

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

Latency and Loss Requirements! Receiver-side Buffering! Dealing with Loss! Loss Recovery!

Latency and Loss Requirements! Receiver-side Buffering! Dealing with Loss! Loss Recovery! Cumulative data! Latency and Loss Requirements! Fundamental characteristics of multimedia applications:! Typically delay sensitive!! live audio < 150 msec end-to-end delay is not perceptible!! 150-400

More information

International Journal of Research Available at

International Journal of Research Available at Design, Implementation and Evaluation of a Telemetry Channel Coding Sublayer Mina Ghaffari 1 ; Elham Hosseini 2 & Ali Sadr 3 1 Research Scholar, Iran University of Science and Technology 2 Research Scholar,

More information

CS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007

CS640: Introduction to Computer Networks. Application Classes. Application Classes (more) 11/20/2007 CS640: Introduction to Computer Networks Aditya Akella Lecture 21 - Multimedia Networking Application Classes Typically sensitive to delay, but can tolerate packet loss (would cause minor glitches that

More information

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach

Chapter 9. Multimedia Networking. Computer Networking: A Top Down Approach Chapter 9 Multimedia Networking A note on the use of these Powerpoint slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations;

More information

Convolutional Codes. COS 463: Wireless Networks Lecture 9 Kyle Jamieson. [Parts adapted from H. Balakrishnan]

Convolutional Codes. COS 463: Wireless Networks Lecture 9 Kyle Jamieson. [Parts adapted from H. Balakrishnan] Convolutional Codes COS 463: Wireless Networks Lecture 9 Kyle Jamieson [Parts adapted from H. Balakrishnan] Today 1. Encoding data using convolutional codes Encoder state Changing code rate: Puncturing

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Chapter 10 Error Detection and Correction 10.1

Chapter 10 Error Detection and Correction 10.1 Chapter 10 Error Detection and Correction 10.1 10-1 INTRODUCTION some issues related, directly or indirectly, to error detection and correction. Topics discussed in this section: Types of Errors Redundancy

More information

Chapter 6 Digital Data Communications Techniques

Chapter 6 Digital Data Communications Techniques Chapter 6 Digital Data Communications Techniques Asynchronous and Synchronous Transmission timing problems require a mechanism to synchronize the transmitter and receiver receiver samples stream at bit

More information

Lecture 7: Flow & Media Access Control"

Lecture 7: Flow & Media Access Control Lecture 7: Flow & Media Access Control" CSE 123: Computer Networks Alex C. Snoeren HW 2 due next Wednesday! Lecture 7 Overview" Flow control Go-back-N Sliding window Methods to share physical media: multiple

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays.

infrared Disadvantage: 1. cannot use for long-range communication or outside a building due to sun s rays. Chapter2: analog and digital signals can take one of two forms: 1. periodic 2. nonperiodic Periodic analog signals can be classified as: 1. simple 2. composite A sine wave is represented by three parameters:

More information

CS 457 Multimedia Applications. Fall 2014

CS 457 Multimedia Applications. Fall 2014 CS 457 Multimedia Applications Fall 2014 Topics Digital audio and video Sampling, quantizing, and compressing Multimedia applications Streaming audio and video for playback Live, interactive audio and

More information

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print,

OSI Layer OSI Name Units Implementation Description 7 Application Data PCs Network services such as file, print, ANNEX B - Communications Protocol Overheads The OSI Model is a conceptual model that standardizes the functions of a telecommunication or computing system without regard of their underlying internal structure

More information

CSCI-1680 Link Layer Reliability Rodrigo Fonseca

CSCI-1680 Link Layer Reliability Rodrigo Fonseca CSCI-1680 Link Layer Reliability Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Last time Physical layer: encoding, modulation Link layer framing Today Getting

More information

Assuring Media Quality in IP Video Networks. Jim Welch IneoQuest Technologies

Assuring Media Quality in IP Video Networks. Jim Welch IneoQuest Technologies Assuring Media Quality in IP Video Networks Jim Welch IneoQuest Technologies Agenda The challenge: Viewer satisfaction requires High Program Availability High Availability metric - what about five 9s?

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW!

CSE 123: Computer Networks Alex C. Snoeren. HW 1 due NOW! CSE 123: Computer Networks Alex C. Snoeren HW 1 due NOW! Automatic Repeat Request (ARQ) Acknowledgements (ACKs) and timeouts Stop-and-Wait Sliding Window Forward Error Correction 2 Link layer is lossy

More information

Network Management & Monitoring

Network Management & Monitoring Network Management & Monitoring Network Delay These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) End-to-end

More information

HN/HX System Bandwidth Efficiency

HN/HX System Bandwidth Efficiency HN/HX System Bandwidth Efficiency It is well understood by satellite network operators that bandwidth efficiency for a VSAT system is a critical element in achieving profitability, as higher efficiency

More information

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding

CS 641 Project Report Error resilient video transmission over wireless networks. December Gang Ding CS 64 Project Report Error resilient video transmission over wireless networks December 00 Gang Ding Abstract This report proposes a general architecture for error resilient video transmission over mobile

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

S Capacity enhancement methods for radio interface ARQ Schemes

S Capacity enhancement methods for radio interface ARQ Schemes ARQ Schemes, March 26 2004 1 S-72.630 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 2004 ARQ Schemes, March 26 2004 2 Outline Classification of error control

More information

IEEE 802.3ap Codes Comparison for 10G Backplane System

IEEE 802.3ap Codes Comparison for 10G Backplane System IEEE 802.3ap Codes Comparison for 10G Backplane System March, 2005 Boris Fakterman, Intel boris.fakterman@intel.com Presentation goal The goal of this presentation is to compare Forward Error Correction

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs.

Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Ferre, PL., Doufexi, A., Chung How, J. T. H., Nix, AR., & Bull, D. (2003). Link adaptation for video transmission over COFDM based WLANs. Peer reviewed version Link to publication record in Explore Bristol

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Lec 19 - Error and Loss Control

Lec 19 - Error and Loss Control ECE 5578 Multimedia Communication Lec 19 - Error and Loss Control Zhu Li Dept of CSEE, UMKC Office: FH560E, Email: lizhu@umkc.edu, Ph: x 2346. http://l.web.umkc.edu/lizhu slides created with WPS Office

More information

MISB EG Motion Imagery Standards Board Engineering Guideline. 24 April Delivery of Low Bandwidth Motion Imagery. 1 Scope.

MISB EG Motion Imagery Standards Board Engineering Guideline. 24 April Delivery of Low Bandwidth Motion Imagery. 1 Scope. Motion Imagery Standards Board Engineering Guideline Delivery of Low Bandwidth Motion Imagery MISB EG 0803 24 April 2008 1 Scope This Motion Imagery Standards Board (MISB) Engineering Guideline (EG) provides

More information

Multimedia Networking

Multimedia Networking CE443 Computer Networks Multimedia Networking Behnam Momeni Computer Engineering Department Sharif University of Technology Acknowledgments: Lecture slides are from Computer networks course thought by

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check.

Error Detection Codes. Error Detection. Two Dimensional Parity. Internet Checksum Algorithm. Cyclic Redundancy Check. Error Detection Two types Error Detection Codes (e.g. CRC, Parity, Checksums) Error Correction Codes (e.g. Hamming, Reed Solomon) Basic Idea Add redundant information to determine if errors have been introduced

More information

Quality of Service (QoS) Whitepaper

Quality of Service (QoS) Whitepaper Quality of Service (QoS) Whitepaper PCS-Series Videoconferencing White Paper www.sonybiz.net/vc Introduction Currently, an estimated 5% of data packets sent over the Internet are lost. In a videoconferencing

More information

Comparative Performance Analysis of Block and Convolution Codes

Comparative Performance Analysis of Block and Convolution Codes Comparative Performance Analysis of Block and Convolution Codes Manika Pandey M.Tech scholar, ECE DIT University Dehradun Vimal Kant Pandey Assistant Professor/ECE DIT University Dehradun ABSTRACT Error

More information

CS 218 F Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness. References:

CS 218 F Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness. References: CS 218 F 2003 Nov 3 lecture: Streaming video/audio Adaptive encoding (eg, layered encoding) TCP friendliness References: J. Padhye, V.Firoiu, D. Towsley, J. Kurose Modeling TCP Throughput: a Simple Model

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 4: Data-Link I: Framing and Errors Some portions courtesy Robin Kravets and Steve Lumetta Last time How protocols are organized & why Network layer Data-link

More information

CSCI-1680 Link Layer Reliability John Jannotti

CSCI-1680 Link Layer Reliability John Jannotti CSCI-1680 Link Layer Reliability John Jannotti Based partly on lecture notes by David Mazières, Phil Levis, Rodrigo Fonseca Roadmap Last time Physical layer: encoding, modulation Link layer framing Today

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

Introduction to Computer Networks. 03 Data Link Layer Introduction

Introduction to Computer Networks. 03 Data Link Layer Introduction Introduction to Computer Networks 03 Data Link Layer Introduction Link Layer 1 Introduction and services 2 Link Layer Services 2.1 Framing 2.2 Error detection and correction 2.3 Flow Control 2.4 Multiple

More information

SONY S QOS TECHNOLOGY

SONY S QOS TECHNOLOGY SONY S QOS TECHNOLOGY ACHIEVE LOW-DELAY, HIGH-QUALITY STREAMING OVER MOBILE NETWORKS SONY CORPORATION PROFESSIONAL SOLUTION GROUP The use of high-speed mobile networks including LTE (Long Term Evolution)

More information

Digital Asset Management 5. Streaming multimedia

Digital Asset Management 5. Streaming multimedia Digital Asset Management 5. Streaming multimedia 2015-10-29 Keys of Streaming Media Algorithms (**) Standards (*****) Complete End-to-End systems (***) Research Frontiers(*) Streaming... Progressive streaming

More information

Lecture / The Data Link Layer: Framing and Error Detection

Lecture / The Data Link Layer: Framing and Error Detection Lecture 2 6.263/16.37 The Data Link Layer: Framing and Error Detection MIT, LIDS Slide 1 Data Link Layer (DLC) Responsible for reliable transmission of packets over a link Framing: Determine the start

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.1: Link Layer Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527 Computer

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst

EITF25 Internet Techniques and Applications L3: Data Link layer. Stefan Höst EITF25 Internet Techniques and Applications L3: Data Link layer Stefan Höst Communication on physical layer To transmit on the physical medium use signals At each computer it can be seen as transmitting

More information

Multimedia networked applications: standards, protocols and research trends

Multimedia networked applications: standards, protocols and research trends Multimedia networked applications: standards, protocols and research trends Maria Teresa Andrade FEUP / INESC Porto mandrade@fe.up.pt ; maria.andrade@inescporto.pt http://www.fe.up.pt/~mandrade/ ; http://www.inescporto.pt

More information

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies

Outline. Basic ARQ schemes. S Capacity enhancement methods for radio interface ARQ Schemes. Classification of error control strategies ARQ Schemes, March 26 24 ARQ Schemes, March 26 24 2 Outline Classification of error control strategies S-7263 Capacity enhancement methods for radio interface ARQ Schemes Markku Liinaharja March 25, 24

More information

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1

Data Link Networks. Hardware Building Blocks. Nodes & Links. CS565 Data Link Networks 1 Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies Encoding - encoding for physical medium Framing - delineation

More information

RECOMMENDATION ITU-R BT.1720 *

RECOMMENDATION ITU-R BT.1720 * Rec. ITU-R BT.1720 1 RECOMMENDATION ITU-R BT.1720 * Quality of service ranking and measurement methods for digital video broadcasting services delivered over broadband Internet protocol networks (Question

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Introduction to LAN/WAN. Application Layer 4

Introduction to LAN/WAN. Application Layer 4 Introduction to LAN/WAN Application Layer 4 Multimedia Multimedia: Audio + video Human ear: 20Hz 20kHz, Dogs hear higher freqs DAC converts audio waves to digital E.g PCM uses 8-bit samples 8000 times

More information

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16

CS 640 Introduction to Computer Networks. Role of data link layer. Today s lecture. Lecture16 Introduction to Computer Networks Lecture16 Role of data link layer Service offered by layer 1: a stream of bits Service to layer 3: sending & receiving frames To achieve this layer 2 does Framing Error

More information

CS 3640: Introduction to Networks and Their Applications

CS 3640: Introduction to Networks and Their Applications CS 3640: Introduction to Networks and Their Applications Fall 2018, Lecture 5: The Link Layer I Errors and medium access Instructor: Rishab Nithyanand Teaching Assistant: Md. Kowsar Hossain 1 You should

More information

Network Architecture

Network Architecture Unit 7 Network Architecture Acknowledgments: These slides were originally developed by Prof. Jean Walrand for EE122. The past and current EE122 instructors including Kevin Fall, Abhay Parekh, Shyam Parekh,

More information

Adaptive Cross-Layer Protection Strategies for Robust Scalable Video Transmission Over WLANs

Adaptive Cross-Layer Protection Strategies for Robust Scalable Video Transmission Over WLANs 1752 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 10, DECEMBER 2003 Adaptive Cross-Layer Protection Strategies for Robust Scalable Video Transmission Over 802.11 WLANs Mihaela van der

More information

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection

Data link layer functions. 2 Computer Networks Data Communications. Framing (1) Framing (2) Parity Checking (1) Error Detection 2 Computer Networks Data Communications Part 6 Data Link Control Data link layer functions Framing Needed to synchronise TX and RX Account for all bits sent Error control Detect and correct errors Flow

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information